SlideShare une entreprise Scribd logo
1  sur  23
Télécharger pour lire hors ligne
INTERNAL USE ONLY




                     German eID and
                    European Context


                        Thomas Walloschke
                         thomas.walloschke@ts.fujitsu.com

                    Deutsch-Spanischer Workshop „eID“ - BITKOM
                     CeBIT 2010 Convention Center 2010-03-03


                                                     Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
German eID

              • ID Card
              • National Application Test 2009/2010
              • Rollout 2010+




INTERNAL USE ONLY               1        Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
The Act – Jun 18, 2009




 INTERNAL USE ONLY       2   Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
The Act – Jun 18, 2009




                                                  Electronic
    ID Card                                        Identity




 INTERNAL USE ONLY       2   Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
ID Card – Contactless ISO 14443
 Functions
      ICAO Travel




                                                                Contactless
                                                                   Chip




                         MRZ
                     Border Control




 INTERNAL USE ONLY                    2   Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
ID Card – Contactless ISO 14443
 Functions
      ICAO Travel
      eIdentity
      eSignature (QES)


                                                          New
                                                         Brand




 INTERNAL USE ONLY        2   Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
ID Card – Contactless ISO 14443
 Functions
      ICAO Travel
      eIdentity
      eSignature (QES)




 EAC, PACE
 2009/2010
  Application Test
 Internet ID Card
 INTERNAL USE ONLY        2   Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
eIdentity – a New Approach for ID Cards
 Internet ID Card
                                 Infrastructure
 Authentication
     Service Provider
      (Access Certificate)
     User
      (ID Card, PIN)




 INTERNAL USE ONLY           2                Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
eIdentity – a New Approach for ID Cards
 Internet ID Card
                                       Infrastructure
 Authentication
     Service Provider
      (Access Certificate)
     User
                                                                        Identity Provider
      (ID Card, PIN)
                                                                    „Trusted Third Party“

                Service Provider
               shop.fujitsu.com

                      eService
                     Integration                           Erika Mustermann




 INTERNAL USE ONLY                 2                Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
National Application Test 2009/2010
 30 Participants – Governmental and Business Partners




 INTERNAL USE ONLY            2         Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
National Application Test 2009/2010
 Fujitsu Online Shop Germany – Best Practice shop.fujitsu.com




 INTERNAL USE ONLY            2         Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
National Application Test 2009/2010
 Fujitsu Online Shop Germany – User Registration with ID Card




 INTERNAL USE ONLY            2         Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
National Application Test 2009/2010
 Fujitsu Online Shop Germany – User Sign On with ID Card




 INTERNAL USE ONLY            2        Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
National Application Test 2009/2010
 Fujitsu Online Shop Germany – „Commercial“ shop.fujitsu.com




 INTERNAL USE ONLY            2         Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
Rollout 2010+
 Governmental Investment Push Program (24„0 € for 12 Month)
  Sponsored Security Kit for Citizens – (Early Adopters)
           Mio.




 Market Stimulation
                                                                                „first-come-
 Enforcing Market Elasticity – Reaching 50% Rollout until 2013                  first-serve“


 INTERNAL USE ONLY                   2            Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
The Federal Ministery of the Interior
 … is Proud to Present …




  INTERNAL USE ONLY         2   Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
European Context


              • STORK
              • ELSA



INTERNAL USE ONLY          1    Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
STORK                     www.eid-stork.eu
 European Identity Cross Border Project (LSP) – 2008 to 2011
 Challenge: Member State specific ID Cards and Infrastructure
 Target: Interoperability Cross Border


 Technology
      Proxy (PEPS)
      Middleware (V-IDP)


 Use Cases (WP6)
      Cross Border
       Portal Identity
      Cross Border
       Student Mobility
      ..

 INTERNAL USE ONLY                2      Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
What‘s Next?
 Rollout Technology and Setup Pilots in 2010 and 2011
 Finish STORK successfully in 2011 in all Member States
 Communicate Results:
      Communicate and promote eID methodology and findings of “STORK”
       among all potential users and institutions at all levels (local, regional,
       national and supranational)
      Develop a response mechanism between core consortium Member
       States and various governments and stakeholders, providing assistance,
       collecting feedback and providing core partners with processed results
      Demonstrate results of Work Package methodology,
       building a framework for sustainable deployment at EU level
      Create a Sustainability Action Plan (WP7)
      Connect eID LSP STORK with eHealth LSP epSOS,
       Procurement LSP PEPPOL, Service Directive LSP SPOCS



 INTERNAL USE ONLY
What‘s Next?
 Pilot Roll Out 2010 and 2011
 Finish STORK successfully in 2011 in all Member States
 Communicate Results:
      Communicate and promote eID methodology and findings of “STORK”
       among all potential users and institutions at all levels (local, regional,
       national and supranational)
      Develop a response mechanism between core consortium Member
       States and various governments and stakeholders, providing assistance,
       collecting feedback and providing core partners with processed results
      Demonstrate results of Work Package methodology,
       building a framework for sustainable deployment at EU level
      Create a Sustainability Action Plan (WP7)
      Connect eID LSP STORK with eHealth LSP epSOS,
       Procurement LSP PEPPOL, Service Directive LSP SPOCS
 And - Join to …

 INTERNAL USE ONLY
European Large Scale Action (ELSA)

 Towards a European electronic Identity Management (eIDM) Infrastructure
  for a trustworthy Information Society
      By 2020 we envision that some 450 million EU citizens will be regular
       users of eID‟s, and in a world of unlimited bandwidth, pervasive
       connectivity, ambient intelligence and electronically enhanced social
       networking, eID‟s will be the key that 'open doors' for the provision of all
       services to citizens and businesses.
      Identifying who you are, anytime and anywhere, and authorising or
       authenticating becomes so simple and easy to use but also so highly
       secure, that citizens and businesses will use their eID's as part and
       parcel of their lives.




 INTERNAL USE ONLY
European Large Scale Action (ELSA)

 Towards a European electronic Identity Management (eIDM) Infrastructure
  for a trustworthy Information Society
      By 2020 we envision that some 450 million EU citizens will be regular
       users of eID‟s, and in a world of unlimited bandwidth, pervasive
       connectivity, ambient intelligence and electronically enhanced social
       networking, eID‟s will be the key that 'open doors' for the provision of all
       services to citizens and businesses.
      Identifying who you are, anytime and anywhere, and authorising or
       authenticating becomes so simple and easy to use but also so highly
       secure, that citizens and businesses will use their eID's as part and
       parcel of their lives.
      ELSA eID is the follower of STORK         – Departure time is 2013…




 INTERNAL USE ONLY
Thank you for your attention




                        Thomas Walloschke
                        thomas.walloschke@ts.fujitsu.com



INTERNAL USE ONLY                      3                   Copyright 2009 FUJITSU TECHNOLOGY SOLUTIONS

Contenu connexe

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

En vedette

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

En vedette (20)

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 

20100303 Fujitsu DE ES Workshop German eID And European Context

  • 1. INTERNAL USE ONLY German eID and European Context Thomas Walloschke thomas.walloschke@ts.fujitsu.com Deutsch-Spanischer Workshop „eID“ - BITKOM CeBIT 2010 Convention Center 2010-03-03 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
  • 2. German eID • ID Card • National Application Test 2009/2010 • Rollout 2010+ INTERNAL USE ONLY 1 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
  • 3. The Act – Jun 18, 2009 INTERNAL USE ONLY 2 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
  • 4. The Act – Jun 18, 2009 Electronic ID Card Identity INTERNAL USE ONLY 2 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
  • 5. ID Card – Contactless ISO 14443  Functions  ICAO Travel Contactless Chip MRZ Border Control INTERNAL USE ONLY 2 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
  • 6. ID Card – Contactless ISO 14443  Functions  ICAO Travel  eIdentity  eSignature (QES) New Brand INTERNAL USE ONLY 2 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
  • 7. ID Card – Contactless ISO 14443  Functions  ICAO Travel  eIdentity  eSignature (QES)  EAC, PACE  2009/2010 Application Test  Internet ID Card INTERNAL USE ONLY 2 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
  • 8. eIdentity – a New Approach for ID Cards  Internet ID Card Infrastructure  Authentication  Service Provider (Access Certificate)  User (ID Card, PIN) INTERNAL USE ONLY 2 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
  • 9. eIdentity – a New Approach for ID Cards  Internet ID Card Infrastructure  Authentication  Service Provider (Access Certificate)  User Identity Provider (ID Card, PIN) „Trusted Third Party“ Service Provider shop.fujitsu.com eService Integration Erika Mustermann INTERNAL USE ONLY 2 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
  • 10. National Application Test 2009/2010  30 Participants – Governmental and Business Partners INTERNAL USE ONLY 2 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
  • 11. National Application Test 2009/2010  Fujitsu Online Shop Germany – Best Practice shop.fujitsu.com INTERNAL USE ONLY 2 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
  • 12. National Application Test 2009/2010  Fujitsu Online Shop Germany – User Registration with ID Card INTERNAL USE ONLY 2 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
  • 13. National Application Test 2009/2010  Fujitsu Online Shop Germany – User Sign On with ID Card INTERNAL USE ONLY 2 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
  • 14. National Application Test 2009/2010  Fujitsu Online Shop Germany – „Commercial“ shop.fujitsu.com INTERNAL USE ONLY 2 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
  • 15. Rollout 2010+  Governmental Investment Push Program (24„0 € for 12 Month) Sponsored Security Kit for Citizens – (Early Adopters) Mio.  Market Stimulation „first-come-  Enforcing Market Elasticity – Reaching 50% Rollout until 2013 first-serve“ INTERNAL USE ONLY 2 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
  • 16. The Federal Ministery of the Interior  … is Proud to Present … INTERNAL USE ONLY 2 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
  • 17. European Context • STORK • ELSA INTERNAL USE ONLY 1 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
  • 18. STORK www.eid-stork.eu  European Identity Cross Border Project (LSP) – 2008 to 2011  Challenge: Member State specific ID Cards and Infrastructure  Target: Interoperability Cross Border  Technology  Proxy (PEPS)  Middleware (V-IDP)  Use Cases (WP6)  Cross Border Portal Identity  Cross Border Student Mobility  .. INTERNAL USE ONLY 2 Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS
  • 19. What‘s Next?  Rollout Technology and Setup Pilots in 2010 and 2011  Finish STORK successfully in 2011 in all Member States  Communicate Results:  Communicate and promote eID methodology and findings of “STORK” among all potential users and institutions at all levels (local, regional, national and supranational)  Develop a response mechanism between core consortium Member States and various governments and stakeholders, providing assistance, collecting feedback and providing core partners with processed results  Demonstrate results of Work Package methodology, building a framework for sustainable deployment at EU level  Create a Sustainability Action Plan (WP7)  Connect eID LSP STORK with eHealth LSP epSOS, Procurement LSP PEPPOL, Service Directive LSP SPOCS INTERNAL USE ONLY
  • 20. What‘s Next?  Pilot Roll Out 2010 and 2011  Finish STORK successfully in 2011 in all Member States  Communicate Results:  Communicate and promote eID methodology and findings of “STORK” among all potential users and institutions at all levels (local, regional, national and supranational)  Develop a response mechanism between core consortium Member States and various governments and stakeholders, providing assistance, collecting feedback and providing core partners with processed results  Demonstrate results of Work Package methodology, building a framework for sustainable deployment at EU level  Create a Sustainability Action Plan (WP7)  Connect eID LSP STORK with eHealth LSP epSOS, Procurement LSP PEPPOL, Service Directive LSP SPOCS  And - Join to … INTERNAL USE ONLY
  • 21. European Large Scale Action (ELSA)  Towards a European electronic Identity Management (eIDM) Infrastructure for a trustworthy Information Society  By 2020 we envision that some 450 million EU citizens will be regular users of eID‟s, and in a world of unlimited bandwidth, pervasive connectivity, ambient intelligence and electronically enhanced social networking, eID‟s will be the key that 'open doors' for the provision of all services to citizens and businesses.  Identifying who you are, anytime and anywhere, and authorising or authenticating becomes so simple and easy to use but also so highly secure, that citizens and businesses will use their eID's as part and parcel of their lives. INTERNAL USE ONLY
  • 22. European Large Scale Action (ELSA)  Towards a European electronic Identity Management (eIDM) Infrastructure for a trustworthy Information Society  By 2020 we envision that some 450 million EU citizens will be regular users of eID‟s, and in a world of unlimited bandwidth, pervasive connectivity, ambient intelligence and electronically enhanced social networking, eID‟s will be the key that 'open doors' for the provision of all services to citizens and businesses.  Identifying who you are, anytime and anywhere, and authorising or authenticating becomes so simple and easy to use but also so highly secure, that citizens and businesses will use their eID's as part and parcel of their lives.  ELSA eID is the follower of STORK – Departure time is 2013… INTERNAL USE ONLY
  • 23. Thank you for your attention Thomas Walloschke thomas.walloschke@ts.fujitsu.com INTERNAL USE ONLY 3 Copyright 2009 FUJITSU TECHNOLOGY SOLUTIONS